共 90 条
[1]
Afshar A, 2014, LECT NOTES COMPUT SC, V8441, P387, DOI 10.1007/978-3-642-55220-5_22
[2]
Two Round Information-Theoretic MPC with Malicious Security
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II,
2019, 11477
:532-561
[3]
Round-Optimal Secure Multiparty Computation with Honest Majority
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II,
2018, 10992
:395-424
[4]
A New Approach to Round-Optimal Secure Multiparty Computation
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I,
2017, 10401
:468-499
[5]
[Anonymous], 2007, VIFF VIRTUAL IDEAL F
[6]
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI [DOI 10.1145/2382196.2382279, 10.1145/2382196.2382279.]
[7]
Applebaum B., 2021, 2021346 CRYPT EPRINT
[8]
Degree 2 is Complete for the Round-Complexity of Malicious MPC
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II,
2019, 11477
:504-531
[9]
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I,
2017, 10401
:727-757
[10]
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:805-817